
Cloud Vulnerability DB
A community-led vulnerabilities database
GStreamer, a library for constructing graphs of media-handling components, was found to contain an out-of-bounds read vulnerability (CVE-2024-47776) in the gstwavparsecuechunk function within gstwavparse.c. The vulnerability was discovered by Antonio Morales and disclosed on December 11, 2024. This issue affects GStreamer versions prior to 1.24.10 ([GitHub Advisory](https://securitylab.github.com/advisories/GHSL-2024-260Gstreamer/), GStreamer Advisory).
The vulnerability occurs due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison 'if (size < 4 + ncues * 24)' to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause stems from a miscalculation when clipping the chunk size based on upstream data size. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H (NVD).
This vulnerability allows reading beyond the bounds of the data buffer, which can lead to two primary impacts: a potential crash resulting in denial of service, or the possible leak of sensitive data from memory. The vulnerability affects applications that process WAV files using the GStreamer library (GitHub Advisory).
The vulnerability has been fixed in GStreamer version 1.24.10. Users are advised to upgrade to this version or apply the available patch. For systems where immediate upgrading is not possible, the recommendation is to exercise caution when processing untrusted WAV files (GStreamer Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."